4.6 Article

An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments

Journal

JOURNAL OF SYSTEMS ARCHITECTURE
Volume 109, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.sysarc.2020.101776

Keywords

Certificateless; Equality test; Flexible authorization; Healthcare environments

Funding

  1. National Key Research and Development Program of China [4702]

Ask authors/readers for more resources

The challenges confronting the privacy of outsourcing medical data have become a significant concern for patients and healthcare providers. The encryption of this sensitive data before outsourcing to the healthcare server present an effective solution for protection. However, searching on different ciphertexts while protecting the privacy of data remains a research challenge. Indeed, most of the existing schemes are inefficient, particularly for deployment on mobile devices due to limited resources (e.g. computing power, battery lifetime, and storage capacity). In this paper, we propose a CertificateLess Public-Key Encryption with Authorized Equality Test (CLPKE-AET) scheme. With the CLPKE-AET scheme, an authorized cloud server is permitted to check the equivalence of two different ciphertexts consisting of the same messages. Moreover, We provide four types of authorizations, base on which an authorized user can directly search on different user's ciphertext using different methods while enhancing the privacy of the user's data. We present our construction from bilinear pairing and demonstrate its security under modified Bilinear Diffie-Hellman (mBDHI) assumption in the Random Oracle Model (ROM). Finally, compared with other's similar schemes, the performance analysis shows that our CLPKE-AET scheme is practical and more suitable for healthcare environments.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Secure mobile health system supporting search function and decryption verification

Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li

Summary: The study proposed a Secure Mobile Health System (SMHS) that supports search function and decryption verification using online/offline attribute-based encryption, providing secure Electronic Health Records (EHRs) and efficient searching over the health cloud. Additionally, the scheme was proven in the standard model and shown to significantly reduce computation costs in the mobile health system through experimental results compared to existing protocols.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Hardware & Architecture

An efficient signcryption of heterogeneous systems for Internet of Vehicles

Ahmed Elkhalil, Jiashu Zhang, Rashad Elhabob, Nabeil Eltayieb

Summary: The rapid development of Internet of Vehicles has led to an increase in connected vehicles, requiring secure communication protocols like HSC-IoV to ensure confidentiality, key revocation, integrity, authentication, and non-repudiation for efficient communication without pairing.

JOURNAL OF SYSTEMS ARCHITECTURE (2021)

Article Computer Science, Artificial Intelligence

Secure image classification with deep neural networks for IoT applications

Abdelrhman Hassan, Fei Liu, Fanchuan Wang, Yong Wang

Summary: The Internet-of-Things (IoT) are widely used in daily life for purposes such as image data collection, traffic monitoring, and road condition prediction. However, security issues remain a challenge for deploying these smart IoT devices and applications.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Telecommunications

Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city

Negalign Wake Hundera, Chuanjie Jin, Muhammad Umar Aftab, Dagmawit Mesfin, Sachin Kumar

Summary: The rapid growth of Internet of Vehicles (IoV) generates a large network that gathers data from vehicles and utilizes cloud computing for authorized access, but privacy and authorized access of data stored in the cloud are primary concerns. To address these issues, attribute-based signcryption (ABSC) provides confidentiality, authenticity, and sender secrecy for data stored in the cloud.

ANNALS OF TELECOMMUNICATIONS (2021)

Article Computer Science, Information Systems

An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles

Ahmed Elkhalil, Jiashu Zhang, Rashad Elhabob

Summary: The proposed Online/Offline signcryption scheme based on blockchain aims to secure data sharing between Internet of Vehicles (IoV) and internet servers by addressing security issues. The protocol satisfies the security requirements of IoV and reduces computational cost and energy consumption significantly.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

Secure content based image retrieval for mobile users with deep neural networks in the cloud

Abdelrhman Hassan, Fei Liu, Fanchuan Wang, Yong Wang

Summary: With the increasing popularity of CBIR and the outsourcing of image retrieval to the cloud, a secure CBIR framework is proposed and implemented in this paper. It utilizes a pre-trained DNN model to extract image feature vectors and employs homomorphic encryption and 2-PC techniques to protect user privacy during image retrieval on the cloud. The framework also includes secure image similarity scoring and result sorting protocols, showcasing its efficiency, accuracy, and security.

JOURNAL OF SYSTEMS ARCHITECTURE (2021)

Article Computer Science, Information Systems

Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city

Negalign Wake Hundera, Chuanjie Jin, Dagmawit Mesfin Geressu, Muhammad Umar Aftab, Oluwasanmi Ariyo Olanrewaju, Hu Xiong

Summary: Advancements in technology and wireless sensors are leading to the Internet of Things, where large amounts of data are collected and processed through cloud servers. Establishing a secure network is crucial for data integrity, and our proposed proxy-based public-key cryptosystem aims to ensure secure and efficient cloud data sharing in IoT environments. The scheme is proven to be secure and reduces computational and communication costs for both senders and receivers.

MULTIMEDIA TOOLS AND APPLICATIONS (2022)

Article Telecommunications

An authorized equality test on identity-based cryptosystem for mobile social networking applications

Abdelrhman Hassan, Rashad Elhabob, Nabeil Eltayieb, Yong Wang

Summary: This article proposed an Authorized Equality Test on Identity-Based Cryptosystem (AET-IBC) scheme to address the problem of providing search functionality on encrypted data in mobile social networking applications. The scheme is highly secure and supports different authorization methods.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Computer Science, Information Systems

Secure aggregate signature scheme for smart city applications

Nabeil Eltayieb, Rashad Elhabob, Muhammad Umar Aftab, Ramil Kuleev, Manuel Mazzara, Muhammad Ahmad

Summary: This paper proposes an authentication protocol with a full aggregation signature to secure smart city applications. By using a certificate-less aggregate signature (CLAS), message authentication, user anonymity, constant signature size, unlinkability, and resistance to replay attacks can be achieved. Performance evaluation results show that the proposed CLAS performs better than existing relevant schemes.

COMPUTER COMMUNICATIONS (2022)

Article Multidisciplinary Sciences

Crowd Density Estimation in Spatial and Temporal Distortion Environment Using Parallel Multi-Size Receptive Fields and Stack Ensemble Meta-Learning

Addis Abebe Assefa, Wenhong Tian, Negalign Wake Hundera, Muhammad Umar Aftab

Summary: Estimating crowd density is essential for various applications, and models with strong symmetry show promising results. However, challenges arise from dynamic scenes with perspective distortions and the difficulty of incorporating features of objects of varying sizes into prediction models. To address this, a framework utilizing a parallel multi-size receptive field units is proposed to improve estimation accuracy by leveraging features from different layers of a CNN model.

SYMMETRY-BASEL (2022)

Article Multidisciplinary Sciences

PSO-Based Ensemble Meta-Learning Approach for Cloud Virtual Machine Resource Usage Prediction

Habte Lejebo Leka, Zhang Fengli, Ayantu Tesfaye Kenea, Negalign Wake Hundera, Tewodros Gizaw Tohye, Abebe Tamrat Tegene

Summary: To meet increasing demand, a cloud system should optimize its available resources and consider the symmetrical issue of high and low oscillations in cloud workload. A proposed particle swarm optimization (PSO)-based ensemble meta-learning workload forecasting approach utilizes base models and their network inputs with PSO-optimized weights. The model employs a blended ensemble learning strategy with three recurrent neural networks (RNNs) and a dense neural network layer, and is evaluated using CPU utilization data from GWA-T-12 and PlanetLab traces, comparing its performance in terms of RMSE to LSTM, GRU, and BiLSTM sub-models.

SYMMETRY-BASEL (2023)

No Data Available